experts and translators of the new domain

Articles by Paul Rosenzweig
Paul Rosenzweig is a prolific author, read a sampling of some of Paul’s most notable publications.

Is Homeland Security A Subset Of National Security?
As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it than the As Jordan Brunner has explained, the new NSPM-4 memorandum reorganizing the National Security Council has far more in it…

Revised Draft Trump EO on Cybersecurity
I’ve received this draft text from 3 different sources: STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is…

Blowing Sources and Public Intelligence Claims
The news today is shocking. Russian authorities have arrested a top Kaspersky cybersecurity manager for espionage. The news today is shocking. Russian authorities have arrested a top Kaspersky cybersecurity manager for espionage. Kaspersky is a…

Hacking American Elections: Why We’re Vulnerable, and How We Can Stop It
The Great Courses, The Teaching Company Take democracy into your own hands with a look at 2016 election interference-and what you can do to stop it from happening again. Nothing is more singularly significant in American government than the ritual of voting; if the...

Obama’s Cybersecurity Legacy
NextGov has a nice summary article on President Obama’s cybersecurity legacy. [Full disclosure: I was interviewed for and quoted in the article]. Here is the intro: NextGov has a nice summary article on President Obama’s cybersecurity legacy. [Full…

A Cybersecurity Bleg
To bleg: An entry on a blog requesting information or contributions. I have such a request. I recently came across this article: Trent Moore, DARPA DEVELOPING NEW COMPUTER CODE THAT IS EFFECTIVELY HACK-PROOF. Published by The Lawfare Institute in…

From Awareness to Action – A Cybersecurity Agenda for the 45th President
Eight years ago, the Center for Strategic and International Studies published an influential report that was a blueprint for early cybersecurity policy development in the Obama Administration. Eight years ago, the Center for Strategic and…

Source Code Review for Thee… But Not For Me…
According to this report from Reuters, Hewlett Packard Enterprises (HPE) has allowed the Russian military to review the source code for ArcSight, a cybersecurity alert system widely used in the Pentagon and in the American private sector. Published…

China’s National Cybersecurity Strategy
Earlier today, the Chinese government released its National Cybersecurity Strategy. A government news agency report on the release is here. According to the report: “China’s top Internet regulator released a cyberspace security strategy on Tuesday,…

Why Cybersecurity Is So Hard—Absurd Division
Cybersecurity is, of course, very hard for any number of practical reasons, ranging from the complexity of the attack surface to the sophistication of persistent threats. And then, of course, there is the “theater of the absurd” division of reasons…